Preview

Digital Solutions and Artificial Intelligence Technologies

Advanced search

Using Artificial Intelligence Capabilities for Cyber Attacks

Abstract

The article discover methods of organizing cyber attacks using artificial intelligence (AI) in the context of growing geopolitical tensions. The analysis of the use of AI by intruders for the subsequent development of protection systems is carried out. The applied method of analysis of MITRE and Lockheed Martin models, as well as considering real cases, make it possible to identify threat groups and techniques for using AI in cyber attacks. The authors substantiate the conclusion that it is necessary to create self-learning security systems against “combat AI”.

About the Authors

E. A. Bogdanov
Financial University under the Government of the Russian Federation
Russian Federation

Evgenii A. Bogdanov - PhD (Math.), Head of the Department of Information Security, Faculty of Information Technology and Big Data Analysis

Moscow



G. A. Ostapenko
Financial University under the Government of the Russian Federation
Russian Federation

Grigory A. Ostapenko - Doct. Sci. (Tech.), Prof., Vice-Rector for Digitalization

Moscow



R. S. Tanchuk
Financial University under the Government of the Russian Federation
Russian Federation

Roman S. Tanchuk - Cand. Sci (Econ.), Deputy Dean for Relations with Russian and International Partners, Faculty of Information Technology and Big Data Analysis

Moscow



References

1. Ostapenko G.A., Vasilchenko A.P., Ostapenko A.A., et al. Automated knowledge bank and cyber attack risk and vulnerability calculator (part i). Information and Security. 2024;27(2):231-238. (In Russ.). DOI: 10.36622/1682-7813.2024.27.2.008

2. Ostapenko G.A., Vasilchenko A.P., Ostapenko A.A., et al. Formalization of knowledge and data of cyber attacks and vulnerabilities. Information and Security. 2024;27(2):231-238. (In Russ.). DOI: 10.36622/1682-7813.2024.27.2.008

3. Namiot D. E. About cyber attacks using artificial intelligence systems. International Journal of Open Information Technologies. 2024;12(9):132–141. URL: http://injoit.org/index.php/j1/article/view/1958 (In Russ.).

4. Nazaryan A. K., Kartsan I. N. Modern cyber attacks: classification and methods of protection. Computer science. Economy. Management — Informatics. Economics. Management. 2025;4(1):1001–1007. (In Russ.). DOI: 10.47813/2782–5280–2025–4–1–1001–1007

5. Guembe B., Azeta A., Misra S., Osamor V. C., Fernandez-Sanz L., Pospelova V. The Emerging Threat of Ai-driven Cyber Attacks: A Review, Applied Artificial Intelligence. 2022;36(1)1–34. DOI: 10.1080/08839514.2022.2037254

6. Kaloudi N., Li J. The AI-Based Cyber Threat Landscape: A Survey. ACM Computing Surveys (CSUR). 2020;53:1–34. DOI: 10.1145/3372823

7. Kotenko I. V., Khmyrov S. S. Analysis of models and techniques used to attribute cybersecurity violators in the implementation of targeted attacks. Cybersecurity issues. 2022;4(50):52–79. (In Russ.). DOI: 10.21681/2311-3456-2022-4-52-79

8. Pikalov P. A., Cyberbullying using artificial intelligence. Current issues in the fight against crime. 2024;2:56–59. URL: https://www.elibrary.ru/dqklru (In Russ.).

9. Langner R. To kill a centrifuge: A technical analysis of what stuxnet’s creators tried to achieve[J], 2013. 37 p. URL: https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf

10. Matyashova D. O. Comparative analysis of threats of malicious use of artificial intelligence for the political situation in Hong Kong and Taiwan. Skif. 2021;6(58):323–330. URL: https://www.elibrary.ru/phpcog (In Russ.).

11. Pantserev K. A. Malicious use of artificial intelligence in Sub-Saharan Africa: Challenges for Pan-African cybersecurity. Vestnik RUDN. International Relations, 2022;2:288–302. (In Russ.). DOI: 10.22363/2313–0660–2022–22–2–288–30


Review

For citations:


Bogdanov E.A., Ostapenko G.A., Tanchuk R.S. Using Artificial Intelligence Capabilities for Cyber Attacks. Digital Solutions and Artificial Intelligence Technologies. 2025;1(2):44-57. (In Russ.)

Views: 18


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 3033-7097 (Online)